General

  • Target

    c8490653868a221b81b3c6f2bd762c313a647a1968526559306798f8ac96c534

  • Size

    95KB

  • Sample

    241121-awag6sxelm

  • MD5

    3dd5073178ff734c0dddcbd959bcb0f5

  • SHA1

    751c49b0bb2eef24bde735890ca23cce5fdb1b51

  • SHA256

    c8490653868a221b81b3c6f2bd762c313a647a1968526559306798f8ac96c534

  • SHA512

    f6aefbc13700d6bafccd4d9c016cb2034784f37eb65d93d3d3c89cd311f7896642d9898a2072af5904c29ea9aeffa34d2d3170ded2a45e24197c1f1cd897b9e1

  • SSDEEP

    1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmv:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg5

Score
10/10

Malware Config

Extracted

Language
xlm4.0
Source
URLs
xlm40.dropper

https://cointrade.world/receipts/0LjXVwpQrhw/

xlm40.dropper

http://www.garantihaliyikama.com/wp-admin/jp64lssPHEe2ii/

xlm40.dropper

http://haircutbar.com/cgi-bin/BC3WAQ8zJY4ALXA4/

xlm40.dropper

http://airhobi.com/system/WLvH1ygkOYQO/

Targets

    • Target

      c8490653868a221b81b3c6f2bd762c313a647a1968526559306798f8ac96c534

    • Size

      95KB

    • MD5

      3dd5073178ff734c0dddcbd959bcb0f5

    • SHA1

      751c49b0bb2eef24bde735890ca23cce5fdb1b51

    • SHA256

      c8490653868a221b81b3c6f2bd762c313a647a1968526559306798f8ac96c534

    • SHA512

      f6aefbc13700d6bafccd4d9c016cb2034784f37eb65d93d3d3c89cd311f7896642d9898a2072af5904c29ea9aeffa34d2d3170ded2a45e24197c1f1cd897b9e1

    • SSDEEP

      1536:UkKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg4HuS4hcTO97v7UYdEJmv:bKpb8rGYrMPe3q7Q0XV5xtezEsi8/dg5

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

MITRE ATT&CK Enterprise v15

Tasks